CVE-2024-2275
Bdtask G-Prescription Gynaecology & OBS Consultation Software OBS Patient/Gynee Prescription cross site scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
A vulnerability, which was classified as problematic, was found in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0. Affected is an unknown function of the component OBS Patient/Gynee Prescription. The manipulation of the argument Patient Title/Full Name/Address/Cheif Complain/LMP/Menstrual Edd/OBS P/OBS Alc/Medicine Name/Medicine Type/Ml/Dose/Days/Comments/Template Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-256044. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Una vulnerabilidad fue encontrada en Bdtask G-Prescription Gynecology & OBS Consultation Software 1.0 y clasificada como problemática. Una función desconocida del componente OBS Patient/Gynee Prescription es afectada por esta función. La manipulación del argumento Título del paciente/Nombre completo/Dirección/Queja del jefe/LMP/Edd menstrual/OBS P/OBS Alc/Nombre del medicamento/Tipo de medicamento/Ml/Dosis/Días/Comentarios/Nombre de la plantilla conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-256044. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Es wurde eine Schwachstelle in Bdtask G-Prescription Gynaecology & OBS Consultation Software 1.0 gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Komponente OBS Patient/Gynee Prescription. Durch Manipulieren des Arguments Patient Title/Full Name/Address/Cheif Complain/LMP/Menstrual Edd/OBS P/OBS Alc/Medicine Name/Medicine Type/Ml/Dose/Days/Comments/Template Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-03-05 First Exploit
- 2024-03-07 CVE Reserved
- 2024-03-08 CVE Published
- 2024-03-08 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.256044 | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/hacker625/CVE-2024-22752 | 2024-03-05 | |
https://drive.google.com/file/d/11QliZKy-7ylKph1vwlXVHaRn5Jmk0Bjg/view?usp=drivesdk | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bdtask Search vendor "Bdtask" | G-Prescription Gynaecology & OBS Consultation Software Search vendor "Bdtask" for product "G-Prescription Gynaecology & OBS Consultation Software" | 1.0 Search vendor "Bdtask" for product "G-Prescription Gynaecology & OBS Consultation Software" and version "1.0" | en |
Affected
|